Open dsernst opened 2 years ago
Best would be to first write failing tests, that attempt to exploit timing attacks
Related to https://github.com/siv-org/siv/issues/160, bc timing attacks are a specific subset of brute forcing attacks, far quicker to carry out if vulnerable. (eg 16 * 10
attempts vs 16 ^ 10
)
Important that the API uses constant time checks (bitwise XOR) for checking credentials, to protect against timing attacks
Relevant spots to cover:
GET /latest
andPOST /update
POST /submit-vote
&GET /is-auth-valid